Security: SSH Client
This section describes the device when it functions as an SSH client.
It covers the following topics:
•
Secure Copy (SCP) and SSH
•
Protection Methods
•
SSH Server Authentication
•
SSH Client Authentication
•
Before You Begin
•
Common Tasks
•
SSH Client Configuration Through the GUI
Secure Copy (SCP) and SSH
Secure Shell or SSH is a network protocol that enables data to be exchanged on a secure channel between
an SSH client (in this case, the device) and an SSH server.
SSH client helps the user manage a network composed of one or more switches in which various system
files are stored on a central SSH server. When configuration files are transferred over a network, Secure
Copy (SCP), which is an application that utilizes the SSH protocol, ensures that sensitive data, such as
username/password cannot be intercepted.
Secure Copy (SCP) is used to securely transfer firmware, boot image, configuration files, language files, and
log files from a central SCP server to a device.
With respect to SSH, the SCP running on the device is an SSH client application and the SCP server is a
SSH server application.
When files are downloaded via TFTP or HTTP, the data transfer is unsecured.
Cisco Small Business 200 Series Smart Switch Administration Guide
21
280